Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2613087.2613095acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

A system for risk awareness during role mining

Published: 25 June 2014 Publication History

Abstract

This paper demonstrates a proof-of-concept prototype that is able to automatically and effectively detect and report different types of risk factors during the process of role mining. A role mining platform is embedded within the tool so that different role-mining algorithms can be used. Once roles are generated, a further analysis is done to detect risk presented by the roles output. To the best of our knowledge there is no such system that effectively detects risk factors and mines roles at the same time. The tool is easy to use, flexible and effective in automatically detecting risk. It can be useful for data analysts and role engineers.

References

[1]
E. Celikel, M. Kantarcioglu, X. Li, and E. Bertino. A Risk Management Approach to RBAC. Risk and Decision Analysis, 1(2), November 2009.
[2]
S. Chari, I. Molloy, Y. Park, and W. Teiken. Ensuring continuous compliance through reconciling policy with usage. In Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, pages 49--60, New York, NY, USA, 2013. ACM.
[3]
A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde. Evaluating the risk of adopting rbac roles. In Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec'10, pages 303--310, Berlin, Heidelberg, 2010. Springer-Verlag.
[4]
A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde. A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst., 50(4):715--731, Mar. 2011.
[5]
H. Huang, F. Shang, and J. Zhang. Approximation algorithms for minimizing the number of roles and administrative assignments in rbac. In Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, COMPSACW '12, pages 427--432, Washington, DC, USA, 2012. IEEE Computer Society.
[6]
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT '03, pages 179--186, New York, NY, USA, 2003.
[7]
M. Nyanchama and S. Osborn. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur., 2(1):3--33, Feb. 1999.

Cited By

View all
  • (2017)A Survey on Access Control Mechanisms in E-commerce EnvironmentsProceedings of the 8th Balkan Conference in Informatics10.1145/3136273.3136288(1-6)Online publication date: 20-Sep-2017
  • (2016)Effect of the amount of chestnuts in the diet of Celta pigs on the fatty acid profile of dry-cured laconGrasas y Aceites10.3989/gya.049215167:1(e119)Online publication date: 4-Feb-2016
  • (2016)The RBAC System Based on Role Risk and User TrustInternational Journal of Computer and Communication Engineering10.17706/IJCCE.2016.5.5.374-3805:5(374-380)Online publication date: 2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
June 2014
234 pages
ISBN:9781450329392
DOI:10.1145/2613087
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mechanisms
  2. risk
  3. systems
  4. tools
  5. usability

Qualifiers

  • Research-article

Conference

SACMAT '14
Sponsor:

Acceptance Rates

SACMAT '14 Paper Acceptance Rate 17 of 58 submissions, 29%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A Survey on Access Control Mechanisms in E-commerce EnvironmentsProceedings of the 8th Balkan Conference in Informatics10.1145/3136273.3136288(1-6)Online publication date: 20-Sep-2017
  • (2016)Effect of the amount of chestnuts in the diet of Celta pigs on the fatty acid profile of dry-cured laconGrasas y Aceites10.3989/gya.049215167:1(e119)Online publication date: 4-Feb-2016
  • (2016)The RBAC System Based on Role Risk and User TrustInternational Journal of Computer and Communication Engineering10.17706/IJCCE.2016.5.5.374-3805:5(374-380)Online publication date: 2016
  • (2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media